Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
Typedeb
Namespacedebian
Namecups-filters
Version1.28.7-1+deb11u2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.28.7-1+deb11u3
Latest_non_vulnerable_version1.28.17-7
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3317-h26p-43ef
vulnerability_id VCID-3317-h26p-43ef
summary security update
references
0
reference_url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS
reference_id
reference_type
scores
url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS
1
reference_url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406
reference_id
reference_type
scores
url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00065.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2016-0491.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0491.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8327.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8327.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8327
reference_id
reference_type
scores
0
value 0.2071
scoring_system epss
scoring_elements 0.95608
published_at 2026-04-18T12:55:00Z
1
value 0.2071
scoring_system epss
scoring_elements 0.95602
published_at 2026-04-16T12:55:00Z
2
value 0.2071
scoring_system epss
scoring_elements 0.9556
published_at 2026-04-01T12:55:00Z
3
value 0.2071
scoring_system epss
scoring_elements 0.95569
published_at 2026-04-02T12:55:00Z
4
value 0.2071
scoring_system epss
scoring_elements 0.95574
published_at 2026-04-04T12:55:00Z
5
value 0.2071
scoring_system epss
scoring_elements 0.95577
published_at 2026-04-07T12:55:00Z
6
value 0.2071
scoring_system epss
scoring_elements 0.95584
published_at 2026-04-08T12:55:00Z
7
value 0.2071
scoring_system epss
scoring_elements 0.95587
published_at 2026-04-09T12:55:00Z
8
value 0.2071
scoring_system epss
scoring_elements 0.95591
published_at 2026-04-11T12:55:00Z
9
value 0.2071
scoring_system epss
scoring_elements 0.95592
published_at 2026-04-12T12:55:00Z
10
value 0.2071
scoring_system epss
scoring_elements 0.95594
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8327
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806886
reference_id
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=806886
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.debian.org/debian-printing/2015/11/msg00020.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-printing/2015/11/msg00020.html
11
reference_url https://lists.debian.org/debian-printing/2015/12/msg00001.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-printing/2015/12/msg00001.html
12
reference_url http://www.debian.org/security/2015/dsa-3411
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3411
13
reference_url http://www.debian.org/security/2015/dsa-3429
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3429
14
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
15
reference_url http://www.securityfocus.com/bid/78524
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/78524
16
reference_url http://www.ubuntu.com/usn/USN-2831-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2831-1
17
reference_url http://www.ubuntu.com/usn/USN-2831-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2831-2
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287523
reference_id 1287523
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287523
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8327
reference_id CVE-2015-8327
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-8327
84
reference_url https://access.redhat.com/errata/RHSA-2016:0491
reference_id RHSA-2016:0491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0491
85
reference_url https://usn.ubuntu.com/2831-1/
reference_id USN-2831-1
reference_type
scores
url https://usn.ubuntu.com/2831-1/
86
reference_url https://usn.ubuntu.com/2831-2/
reference_id USN-2831-2
reference_type
scores
url https://usn.ubuntu.com/2831-2/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.2.0-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.2.0-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2015-8327
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3317-h26p-43ef
1
url VCID-39f1-22a5-c7aw
vulnerability_id VCID-39f1-22a5-c7aw
summary
Multiple vulnerabilities have been found in cups-filters, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3258.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3258
reference_id
reference_type
scores
0
value 0.37078
scoring_system epss
scoring_elements 0.97131
published_at 2026-04-01T12:55:00Z
1
value 0.37078
scoring_system epss
scoring_elements 0.97138
published_at 2026-04-02T12:55:00Z
2
value 0.37078
scoring_system epss
scoring_elements 0.97144
published_at 2026-04-04T12:55:00Z
3
value 0.37078
scoring_system epss
scoring_elements 0.97145
published_at 2026-04-07T12:55:00Z
4
value 0.37078
scoring_system epss
scoring_elements 0.97154
published_at 2026-04-08T12:55:00Z
5
value 0.37078
scoring_system epss
scoring_elements 0.97155
published_at 2026-04-09T12:55:00Z
6
value 0.37078
scoring_system epss
scoring_elements 0.97159
published_at 2026-04-11T12:55:00Z
7
value 0.37078
scoring_system epss
scoring_elements 0.9716
published_at 2026-04-12T12:55:00Z
8
value 0.37078
scoring_system epss
scoring_elements 0.97161
published_at 2026-04-13T12:55:00Z
9
value 0.37078
scoring_system epss
scoring_elements 0.97169
published_at 2026-04-16T12:55:00Z
10
value 0.37078
scoring_system epss
scoring_elements 0.9717
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3258
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1235385
reference_id 1235385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1235385
5
reference_url https://security.gentoo.org/glsa/201510-08
reference_id GLSA-201510-08
reference_type
scores
url https://security.gentoo.org/glsa/201510-08
6
reference_url https://access.redhat.com/errata/RHSA-2015:2360
reference_id RHSA-2015:2360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2360
7
reference_url https://usn.ubuntu.com/2659-1/
reference_id USN-2659-1
reference_type
scores
url https://usn.ubuntu.com/2659-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.70-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.0.70-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.70-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2015-3258
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-39f1-22a5-c7aw
2
url VCID-4bxg-5tnm-y3hw
vulnerability_id VCID-4bxg-5tnm-y3hw
summary
Multiple vulnerabilities have been found in cups-filters, worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6476
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.5254
published_at 2026-04-01T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52585
published_at 2026-04-02T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52612
published_at 2026-04-04T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52578
published_at 2026-04-07T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52629
published_at 2026-04-08T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52624
published_at 2026-04-09T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52674
published_at 2026-04-11T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52657
published_at 2026-04-12T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52642
published_at 2026-04-13T12:55:00Z
9
value 0.00293
scoring_system epss
scoring_elements 0.5268
published_at 2026-04-16T12:55:00Z
10
value 0.00293
scoring_system epss
scoring_elements 0.52687
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6476
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
reference_id 741318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
reference_id 741333
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
6
reference_url https://security.gentoo.org/glsa/201406-16
reference_id GLSA-201406-16
reference_type
scores
url https://security.gentoo.org/glsa/201406-16
7
reference_url https://usn.ubuntu.com/2143-1/
reference_id USN-2143-1
reference_type
scores
url https://usn.ubuntu.com/2143-1/
8
reference_url https://usn.ubuntu.com/2144-1/
reference_id USN-2144-1
reference_type
scores
url https://usn.ubuntu.com/2144-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.47-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2013-6476
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4bxg-5tnm-y3hw
3
url VCID-581d-k9k6-rke4
vulnerability_id VCID-581d-k9k6-rke4
summary cups-filters: unsupported BrowseAllow value lets cups-browsed accept from all hosts
references
0
reference_url http://openwall.com/lists/oss-security/2014/04/25/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/04/25/7
1
reference_url http://openwall.com/lists/oss-security/2014/06/19/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/06/19/12
2
reference_url http://rhn.redhat.com/errata/RHSA-2014-1795.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1795.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4338.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4338.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4338
reference_id
reference_type
scores
0
value 0.00394
scoring_system epss
scoring_elements 0.6038
published_at 2026-04-18T12:55:00Z
1
value 0.00394
scoring_system epss
scoring_elements 0.60207
published_at 2026-04-01T12:55:00Z
2
value 0.00394
scoring_system epss
scoring_elements 0.60283
published_at 2026-04-02T12:55:00Z
3
value 0.00394
scoring_system epss
scoring_elements 0.60309
published_at 2026-04-04T12:55:00Z
4
value 0.00394
scoring_system epss
scoring_elements 0.60277
published_at 2026-04-07T12:55:00Z
5
value 0.00394
scoring_system epss
scoring_elements 0.60327
published_at 2026-04-08T12:55:00Z
6
value 0.00394
scoring_system epss
scoring_elements 0.60342
published_at 2026-04-09T12:55:00Z
7
value 0.00394
scoring_system epss
scoring_elements 0.60363
published_at 2026-04-11T12:55:00Z
8
value 0.00394
scoring_system epss
scoring_elements 0.6035
published_at 2026-04-12T12:55:00Z
9
value 0.00394
scoring_system epss
scoring_elements 0.60331
published_at 2026-04-13T12:55:00Z
10
value 0.00394
scoring_system epss
scoring_elements 0.60372
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4338
5
reference_url https://bugs.linuxfoundation.org/show_bug.cgi?id=1204
reference_id
reference_type
scores
url https://bugs.linuxfoundation.org/show_bug.cgi?id=1204
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4338
7
reference_url http://secunia.com/advisories/62044
reference_id
reference_type
scores
url http://secunia.com/advisories/62044
8
reference_url http://www.securityfocus.com/bid/68124
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68124
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1091568
reference_id 1091568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1091568
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4338
reference_id CVE-2014-4338
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-4338
12
reference_url https://access.redhat.com/errata/RHSA-2014:1795
reference_id RHSA-2014:1795
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1795
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.53-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.0.53-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.53-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2014-4338
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-581d-k9k6-rke4
4
url VCID-6qd1-jvb8-jqak
vulnerability_id VCID-6qd1-jvb8-jqak
summary cups: cups-filters: cups-filters: Out-of-bounds write via crafted PDF MediaBox
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-64503
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06556
published_at 2026-04-18T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06652
published_at 2026-04-11T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06645
published_at 2026-04-12T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06637
published_at 2026-04-13T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06564
published_at 2026-04-16T12:55:00Z
5
value 0.00048
scoring_system epss
scoring_elements 0.14819
published_at 2026-04-08T12:55:00Z
6
value 0.00048
scoring_system epss
scoring_elements 0.14849
published_at 2026-04-02T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.14926
published_at 2026-04-04T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14728
published_at 2026-04-07T12:55:00Z
9
value 0.00048
scoring_system epss
scoring_elements 0.14874
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-64503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64503
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697
reference_id 1120697
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120697
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698
reference_id 1120698
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120698
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414705
reference_id 2414705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414705
7
reference_url https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865
reference_id 50d94ca0f2fa6177613c97c59791bde568631865
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/commit/50d94ca0f2fa6177613c97c59791bde568631865
8
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9
reference_id GHSA-893j-2wr2-wrh9
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-893j-2wr2-wrh9
9
reference_url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620
reference_id pdftoraster.cxx#L1620
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1620
10
reference_url https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790
reference_id pdftoraster.cxx#L1790
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/libcupsfilters/blob/1dd86d835b27ed149b66aee1a4853d1db8a1f44c/cupsfilters/pdftoraster.cxx#L1790
11
reference_url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880
reference_id pdftoraster.cxx#L1880
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-13T16:56:00Z/
url https://github.com/OpenPrinting/cups-filters/blob/aea8d0db017e495b0204433ebdb0e86b4871094c/filter/pdftoraster.cxx#L1880
12
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
13
reference_url https://usn.ubuntu.com/7877-1/
reference_id USN-7877-1
reference_type
scores
url https://usn.ubuntu.com/7877-1/
14
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2025-64503
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6qd1-jvb8-jqak
5
url VCID-7xq5-z572-xub3
vulnerability_id VCID-7xq5-z572-xub3
summary cups: CUPS-Filters: Information disclosure and data corruption via crafted TIFF image file processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-57812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-57812
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04102
published_at 2026-04-18T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04165
published_at 2026-04-11T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04148
published_at 2026-04-12T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04123
published_at 2026-04-13T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04094
published_at 2026-04-16T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15646
published_at 2026-04-04T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15579
published_at 2026-04-02T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15589
published_at 2026-04-09T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15534
published_at 2026-04-08T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15447
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-57812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57812
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703
reference_id 1120703
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120703
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704
reference_id 1120704
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120704
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414632
reference_id 2414632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414632
7
reference_url https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa
reference_id b69dfacec7f176281782e2f7ac44f04bf9633cfa
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/commit/b69dfacec7f176281782e2f7ac44f04bf9633cfa
8
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4
reference_id GHSA-jpxg-qc2c-hgv4
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-jpxg-qc2c-hgv4
9
reference_url https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32
reference_id image-tiff.c#L32
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/libcupsfilters/blob/33421982e10f6a14bc0bab03b80c9cf4660e8d7d/cupsfilters/image-tiff.c#L32
10
reference_url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34
reference_id image-tiff.c#L34
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/cupsfilters/image-tiff.c#L34
11
reference_url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613
reference_id imagetoraster.c#L613
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-12T20:46:48Z/
url https://github.com/OpenPrinting/cups-filters/blob/3c58463e341b12c9d30d7d3807d2bac1bc595a78/filter/imagetoraster.c#L613
12
reference_url https://access.redhat.com/errata/RHSA-2026:8814
reference_id RHSA-2026:8814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8814
13
reference_url https://usn.ubuntu.com/7877-1/
reference_id USN-7877-1
reference_type
scores
url https://usn.ubuntu.com/7877-1/
14
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2025-57812
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xq5-z572-xub3
6
url VCID-843p-8xve-nfer
vulnerability_id VCID-843p-8xve-nfer
summary
Multiple vulnerabilities have been found in cups-filters, worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6474
reference_id
reference_type
scores
0
value 0.20771
scoring_system epss
scoring_elements 0.95567
published_at 2026-04-01T12:55:00Z
1
value 0.20771
scoring_system epss
scoring_elements 0.95576
published_at 2026-04-02T12:55:00Z
2
value 0.20771
scoring_system epss
scoring_elements 0.95581
published_at 2026-04-04T12:55:00Z
3
value 0.20771
scoring_system epss
scoring_elements 0.95583
published_at 2026-04-07T12:55:00Z
4
value 0.20771
scoring_system epss
scoring_elements 0.95589
published_at 2026-04-08T12:55:00Z
5
value 0.20771
scoring_system epss
scoring_elements 0.95592
published_at 2026-04-09T12:55:00Z
6
value 0.20771
scoring_system epss
scoring_elements 0.95597
published_at 2026-04-11T12:55:00Z
7
value 0.20771
scoring_system epss
scoring_elements 0.95598
published_at 2026-04-12T12:55:00Z
8
value 0.20771
scoring_system epss
scoring_elements 0.956
published_at 2026-04-13T12:55:00Z
9
value 0.20771
scoring_system epss
scoring_elements 0.95609
published_at 2026-04-16T12:55:00Z
10
value 0.20771
scoring_system epss
scoring_elements 0.95613
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6474
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
reference_id 741318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
reference_id 741333
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
6
reference_url https://security.gentoo.org/glsa/201406-16
reference_id GLSA-201406-16
reference_type
scores
url https://security.gentoo.org/glsa/201406-16
7
reference_url https://usn.ubuntu.com/2143-1/
reference_id USN-2143-1
reference_type
scores
url https://usn.ubuntu.com/2143-1/
8
reference_url https://usn.ubuntu.com/2144-1/
reference_id USN-2144-1
reference_type
scores
url https://usn.ubuntu.com/2144-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.47-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2013-6474
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-843p-8xve-nfer
7
url VCID-8vd7-dfbu-23d4
vulnerability_id VCID-8vd7-dfbu-23d4
summary cups-filters: incomplete fix for CVE-2014-2707
references
0
reference_url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194
reference_id
reference_type
scores
url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194
1
reference_url http://openwall.com/lists/oss-security/2014/04/25/7
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/04/25/7
2
reference_url http://openwall.com/lists/oss-security/2014/06/19/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/06/19/12
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4336.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4336.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4336
reference_id
reference_type
scores
0
value 0.00523
scoring_system epss
scoring_elements 0.66967
published_at 2026-04-18T12:55:00Z
1
value 0.00523
scoring_system epss
scoring_elements 0.66845
published_at 2026-04-01T12:55:00Z
2
value 0.00523
scoring_system epss
scoring_elements 0.66883
published_at 2026-04-02T12:55:00Z
3
value 0.00523
scoring_system epss
scoring_elements 0.66909
published_at 2026-04-04T12:55:00Z
4
value 0.00523
scoring_system epss
scoring_elements 0.66882
published_at 2026-04-07T12:55:00Z
5
value 0.00523
scoring_system epss
scoring_elements 0.66931
published_at 2026-04-08T12:55:00Z
6
value 0.00523
scoring_system epss
scoring_elements 0.66944
published_at 2026-04-09T12:55:00Z
7
value 0.00523
scoring_system epss
scoring_elements 0.66964
published_at 2026-04-11T12:55:00Z
8
value 0.00523
scoring_system epss
scoring_elements 0.6695
published_at 2026-04-12T12:55:00Z
9
value 0.00523
scoring_system epss
scoring_elements 0.66919
published_at 2026-04-13T12:55:00Z
10
value 0.00523
scoring_system epss
scoring_elements 0.66952
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4336
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4336
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4336
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1091565
reference_id 1091565
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1091565
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4336
reference_id CVE-2014-4336
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:A/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4336
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.53-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.0.53-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.53-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2014-4336
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8vd7-dfbu-23d4
8
url VCID-bgm5-bmfa-yugq
vulnerability_id VCID-bgm5-bmfa-yugq
summary cups-filters: remote command execution in remove_bad_chars() (incomplete fix for CVE-2014-2707)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2265.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2265
reference_id
reference_type
scores
0
value 0.05767
scoring_system epss
scoring_elements 0.90433
published_at 2026-04-01T12:55:00Z
1
value 0.05767
scoring_system epss
scoring_elements 0.90437
published_at 2026-04-02T12:55:00Z
2
value 0.05767
scoring_system epss
scoring_elements 0.90449
published_at 2026-04-04T12:55:00Z
3
value 0.05767
scoring_system epss
scoring_elements 0.90454
published_at 2026-04-07T12:55:00Z
4
value 0.05767
scoring_system epss
scoring_elements 0.90467
published_at 2026-04-08T12:55:00Z
5
value 0.05767
scoring_system epss
scoring_elements 0.90472
published_at 2026-04-09T12:55:00Z
6
value 0.05767
scoring_system epss
scoring_elements 0.9048
published_at 2026-04-12T12:55:00Z
7
value 0.05767
scoring_system epss
scoring_elements 0.90473
published_at 2026-04-13T12:55:00Z
8
value 0.05767
scoring_system epss
scoring_elements 0.9049
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2265
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2265
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1199130
reference_id 1199130
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1199130
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780267
reference_id 780267
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=780267
5
reference_url https://usn.ubuntu.com/2532-1/
reference_id USN-2532-1
reference_type
scores
url https://usn.ubuntu.com/2532-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.61-5?distro=trixie
purl pkg:deb/debian/cups-filters@1.0.61-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.61-5%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2015-2265
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bgm5-bmfa-yugq
9
url VCID-cne2-7ev5-abgv
vulnerability_id VCID-cne2-7ev5-abgv
summary
Multiple vulnerabilities have been found in cups-filters, worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2707.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-2707.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2707
reference_id
reference_type
scores
0
value 0.01338
scoring_system epss
scoring_elements 0.7995
published_at 2026-04-01T12:55:00Z
1
value 0.01338
scoring_system epss
scoring_elements 0.79958
published_at 2026-04-02T12:55:00Z
2
value 0.01338
scoring_system epss
scoring_elements 0.79979
published_at 2026-04-04T12:55:00Z
3
value 0.01338
scoring_system epss
scoring_elements 0.79968
published_at 2026-04-07T12:55:00Z
4
value 0.01338
scoring_system epss
scoring_elements 0.79996
published_at 2026-04-08T12:55:00Z
5
value 0.01338
scoring_system epss
scoring_elements 0.80005
published_at 2026-04-09T12:55:00Z
6
value 0.01338
scoring_system epss
scoring_elements 0.80025
published_at 2026-04-11T12:55:00Z
7
value 0.01338
scoring_system epss
scoring_elements 0.80009
published_at 2026-04-12T12:55:00Z
8
value 0.01338
scoring_system epss
scoring_elements 0.80001
published_at 2026-04-13T12:55:00Z
9
value 0.01338
scoring_system epss
scoring_elements 0.80029
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2707
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1083326
reference_id 1083326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1083326
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743470
reference_id 743470
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=743470
5
reference_url https://security.gentoo.org/glsa/201406-16
reference_id GLSA-201406-16
reference_type
scores
url https://security.gentoo.org/glsa/201406-16
6
reference_url https://usn.ubuntu.com/2210-1/
reference_id USN-2210-1
reference_type
scores
url https://usn.ubuntu.com/2210-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.51-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.0.51-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.51-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2014-2707
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cne2-7ev5-abgv
10
url VCID-dvvu-6p49-vbhz
vulnerability_id VCID-dvvu-6p49-vbhz
summary cups-filters: cups-browsed DoS via process_browse_data() OOB read
references
0
reference_url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194
reference_id
reference_type
scores
url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194
1
reference_url http://openwall.com/lists/oss-security/2014/06/19/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/06/19/12
2
reference_url http://rhn.redhat.com/errata/RHSA-2014-1795.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1795.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4337.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4337.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-4337
reference_id
reference_type
scores
0
value 0.02131
scoring_system epss
scoring_elements 0.84202
published_at 2026-04-18T12:55:00Z
1
value 0.02131
scoring_system epss
scoring_elements 0.84111
published_at 2026-04-01T12:55:00Z
2
value 0.02131
scoring_system epss
scoring_elements 0.84124
published_at 2026-04-02T12:55:00Z
3
value 0.02131
scoring_system epss
scoring_elements 0.84142
published_at 2026-04-04T12:55:00Z
4
value 0.02131
scoring_system epss
scoring_elements 0.84144
published_at 2026-04-07T12:55:00Z
5
value 0.02131
scoring_system epss
scoring_elements 0.84165
published_at 2026-04-08T12:55:00Z
6
value 0.02131
scoring_system epss
scoring_elements 0.84172
published_at 2026-04-09T12:55:00Z
7
value 0.02131
scoring_system epss
scoring_elements 0.84189
published_at 2026-04-11T12:55:00Z
8
value 0.02131
scoring_system epss
scoring_elements 0.84183
published_at 2026-04-12T12:55:00Z
9
value 0.02131
scoring_system epss
scoring_elements 0.8418
published_at 2026-04-13T12:55:00Z
10
value 0.02131
scoring_system epss
scoring_elements 0.84201
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-4337
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4337
6
reference_url http://secunia.com/advisories/62044
reference_id
reference_type
scores
url http://secunia.com/advisories/62044
7
reference_url http://www.securityfocus.com/bid/68122
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/68122
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1111510
reference_id 1111510
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1111510
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-4337
reference_id CVE-2014-4337
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-4337
11
reference_url https://access.redhat.com/errata/RHSA-2014:1795
reference_id RHSA-2014:1795
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1795
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.53-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.0.53-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.53-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2014-4337
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dvvu-6p49-vbhz
11
url VCID-ed99-uccv-d7bh
vulnerability_id VCID-ed99-uccv-d7bh
summary
Multiple vulnerabilities have been found in cups-filters, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3279.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3279
reference_id
reference_type
scores
0
value 0.34505
scoring_system epss
scoring_elements 0.96967
published_at 2026-04-01T12:55:00Z
1
value 0.34505
scoring_system epss
scoring_elements 0.96975
published_at 2026-04-02T12:55:00Z
2
value 0.34505
scoring_system epss
scoring_elements 0.96979
published_at 2026-04-04T12:55:00Z
3
value 0.34505
scoring_system epss
scoring_elements 0.96981
published_at 2026-04-07T12:55:00Z
4
value 0.34505
scoring_system epss
scoring_elements 0.9699
published_at 2026-04-08T12:55:00Z
5
value 0.34505
scoring_system epss
scoring_elements 0.96991
published_at 2026-04-09T12:55:00Z
6
value 0.34505
scoring_system epss
scoring_elements 0.96993
published_at 2026-04-11T12:55:00Z
7
value 0.34505
scoring_system epss
scoring_elements 0.96994
published_at 2026-04-12T12:55:00Z
8
value 0.34505
scoring_system epss
scoring_elements 0.96995
published_at 2026-04-13T12:55:00Z
9
value 0.34505
scoring_system epss
scoring_elements 0.97004
published_at 2026-04-16T12:55:00Z
10
value 0.34505
scoring_system epss
scoring_elements 0.97007
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3279
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1238990
reference_id 1238990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1238990
5
reference_url https://security.gentoo.org/glsa/201510-08
reference_id GLSA-201510-08
reference_type
scores
url https://security.gentoo.org/glsa/201510-08
6
reference_url https://access.redhat.com/errata/RHSA-2015:2360
reference_id RHSA-2015:2360
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2360
7
reference_url https://usn.ubuntu.com/2659-1/
reference_id USN-2659-1
reference_type
scores
url https://usn.ubuntu.com/2659-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.71-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.0.71-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.71-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2015-3279
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ed99-uccv-d7bh
12
url VCID-f6n6-k5ye-3ugq
vulnerability_id VCID-f6n6-k5ye-3ugq
summary cups-filters: libcupsfilters: `cfGetPrinterAttributes` API does not perform sanitization on returned IPP attributes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47076.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47076.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47076
reference_id
reference_type
scores
0
value 0.73875
scoring_system epss
scoring_elements 0.98827
published_at 2026-04-18T12:55:00Z
1
value 0.73875
scoring_system epss
scoring_elements 0.98813
published_at 2026-04-04T12:55:00Z
2
value 0.73875
scoring_system epss
scoring_elements 0.98816
published_at 2026-04-07T12:55:00Z
3
value 0.73875
scoring_system epss
scoring_elements 0.98817
published_at 2026-04-09T12:55:00Z
4
value 0.73875
scoring_system epss
scoring_elements 0.98819
published_at 2026-04-11T12:55:00Z
5
value 0.73875
scoring_system epss
scoring_elements 0.9882
published_at 2026-04-12T12:55:00Z
6
value 0.73875
scoring_system epss
scoring_elements 0.98821
published_at 2026-04-13T12:55:00Z
7
value 0.73875
scoring_system epss
scoring_elements 0.98825
published_at 2026-04-16T12:55:00Z
8
value 0.74242
scoring_system epss
scoring_elements 0.9883
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47076
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082821
reference_id 1082821
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082821
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082827
reference_id 1082827
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082827
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314253
reference_id 2314253
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314253
7
reference_url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
reference_id Attacking-UNIX-systems-via-CUPS-Part-I
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
8
reference_url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
reference_id GHSA-7xfx-47qg-grp6
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
9
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
reference_id GHSA-p9rh-jxmq-gq47
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
10
reference_url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
reference_id GHSA-rj88-6mr5-rcw8
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
11
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
reference_id GHSA-w63j-6g73-wmg5
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
12
reference_url https://access.redhat.com/errata/RHSA-2024:7346
reference_id RHSA-2024:7346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7346
13
reference_url https://access.redhat.com/errata/RHSA-2024:7461
reference_id RHSA-2024:7461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7461
14
reference_url https://access.redhat.com/errata/RHSA-2024:7462
reference_id RHSA-2024:7462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7462
15
reference_url https://access.redhat.com/errata/RHSA-2024:7463
reference_id RHSA-2024:7463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7463
16
reference_url https://access.redhat.com/errata/RHSA-2024:7503
reference_id RHSA-2024:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7503
17
reference_url https://access.redhat.com/errata/RHSA-2024:7504
reference_id RHSA-2024:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7504
18
reference_url https://access.redhat.com/errata/RHSA-2024:7506
reference_id RHSA-2024:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7506
19
reference_url https://access.redhat.com/errata/RHSA-2024:7551
reference_id RHSA-2024:7551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7551
20
reference_url https://access.redhat.com/errata/RHSA-2024:7553
reference_id RHSA-2024:7553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7553
21
reference_url https://access.redhat.com/errata/RHSA-2024:7623
reference_id RHSA-2024:7623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7623
22
reference_url https://usn.ubuntu.com/7043-1/
reference_id USN-7043-1
reference_type
scores
url https://usn.ubuntu.com/7043-1/
23
reference_url https://usn.ubuntu.com/7043-4/
reference_id USN-7043-4
reference_type
scores
url https://usn.ubuntu.com/7043-4/
24
reference_url https://usn.ubuntu.com/7044-1/
reference_id USN-7044-1
reference_type
scores
url https://usn.ubuntu.com/7044-1/
25
reference_url https://www.cups.org
reference_id www.cups.org
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T17:59:05Z/
url https://www.cups.org
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-5?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-5%3Fdistro=trixie
5
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2024-47076
risk_score 10.0
exploitability 2.0
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f6n6-k5ye-3ugq
13
url VCID-g55y-sm3g-pbd6
vulnerability_id VCID-g55y-sm3g-pbd6
summary foomatic: potential remote arbitrary code execution
references
0
reference_url http://bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog
reference_id
reference_type
scores
url http://bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog
1
reference_url http://rhn.redhat.com/errata/RHSA-2016-0491.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0491.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-5325.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-5325.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-5325
reference_id
reference_type
scores
0
value 0.06308
scoring_system epss
scoring_elements 0.90988
published_at 2026-04-18T12:55:00Z
1
value 0.06308
scoring_system epss
scoring_elements 0.90966
published_at 2026-04-12T12:55:00Z
2
value 0.06308
scoring_system epss
scoring_elements 0.9099
published_at 2026-04-16T12:55:00Z
3
value 0.06308
scoring_system epss
scoring_elements 0.90913
published_at 2026-04-01T12:55:00Z
4
value 0.06308
scoring_system epss
scoring_elements 0.90919
published_at 2026-04-02T12:55:00Z
5
value 0.06308
scoring_system epss
scoring_elements 0.90928
published_at 2026-04-04T12:55:00Z
6
value 0.06308
scoring_system epss
scoring_elements 0.90939
published_at 2026-04-07T12:55:00Z
7
value 0.06308
scoring_system epss
scoring_elements 0.9095
published_at 2026-04-08T12:55:00Z
8
value 0.06308
scoring_system epss
scoring_elements 0.90956
published_at 2026-04-09T12:55:00Z
9
value 0.06308
scoring_system epss
scoring_elements 0.90965
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-5325
4
reference_url https://bugs.linuxfoundation.org/show_bug.cgi?id=515
reference_id
reference_type
scores
url https://bugs.linuxfoundation.org/show_bug.cgi?id=515
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5325
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv2
scoring_elements AV:A/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2016/02/15/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/15/1
8
reference_url http://www.openwall.com/lists/oss-security/2016/02/15/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/15/7
9
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1218297
reference_id 1218297
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1218297
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-5325
reference_id CVE-2010-5325
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2010-5325
20
reference_url https://access.redhat.com/errata/RHSA-2016:0491
reference_id RHSA-2016:0491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0491
fixed_packages
0
url pkg:deb/debian/cups-filters@0?distro=trixie
purl pkg:deb/debian/cups-filters@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@0%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2010-5325
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g55y-sm3g-pbd6
14
url VCID-jvcy-2qyh-jqg4
vulnerability_id VCID-jvcy-2qyh-jqg4
summary cups-browsed: cups-browsed binds on UDP INADDR_ANY:631 trusting any packet from any source
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47176.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47176
reference_id
reference_type
scores
0
value 0.87039
scoring_system epss
scoring_elements 0.99434
published_at 2026-04-02T12:55:00Z
1
value 0.87593
scoring_system epss
scoring_elements 0.99468
published_at 2026-04-18T12:55:00Z
2
value 0.87593
scoring_system epss
scoring_elements 0.99458
published_at 2026-04-04T12:55:00Z
3
value 0.87593
scoring_system epss
scoring_elements 0.9946
published_at 2026-04-07T12:55:00Z
4
value 0.87593
scoring_system epss
scoring_elements 0.99461
published_at 2026-04-08T12:55:00Z
5
value 0.87593
scoring_system epss
scoring_elements 0.99462
published_at 2026-04-09T12:55:00Z
6
value 0.87593
scoring_system epss
scoring_elements 0.99463
published_at 2026-04-11T12:55:00Z
7
value 0.87593
scoring_system epss
scoring_elements 0.99464
published_at 2026-04-13T12:55:00Z
8
value 0.87593
scoring_system epss
scoring_elements 0.99467
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47176
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820
reference_id 1082820
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1082820
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314252
reference_id 2314252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314252
6
reference_url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
reference_id Attacking-UNIX-systems-via-CUPS-Part-I
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I
7
reference_url https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992
reference_id cups-browsed.c#L13992
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/cups-browsed/blob/master/daemon/cups-browsed.c#L13992
8
reference_url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
reference_id GHSA-7xfx-47qg-grp6
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/libppd/security/advisories/GHSA-7xfx-47qg-grp6
9
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
reference_id GHSA-p9rh-jxmq-gq47
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-p9rh-jxmq-gq47
10
reference_url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
reference_id GHSA-rj88-6mr5-rcw8
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/cups-browsed/security/advisories/GHSA-rj88-6mr5-rcw8
11
reference_url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
reference_id GHSA-w63j-6g73-wmg5
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://github.com/OpenPrinting/libcupsfilters/security/advisories/GHSA-w63j-6g73-wmg5
12
reference_url https://access.redhat.com/errata/RHSA-2024:7346
reference_id RHSA-2024:7346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7346
13
reference_url https://access.redhat.com/errata/RHSA-2024:7461
reference_id RHSA-2024:7461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7461
14
reference_url https://access.redhat.com/errata/RHSA-2024:7462
reference_id RHSA-2024:7462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7462
15
reference_url https://access.redhat.com/errata/RHSA-2024:7463
reference_id RHSA-2024:7463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7463
16
reference_url https://access.redhat.com/errata/RHSA-2024:7503
reference_id RHSA-2024:7503
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7503
17
reference_url https://access.redhat.com/errata/RHSA-2024:7504
reference_id RHSA-2024:7504
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7504
18
reference_url https://access.redhat.com/errata/RHSA-2024:7506
reference_id RHSA-2024:7506
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7506
19
reference_url https://access.redhat.com/errata/RHSA-2024:7551
reference_id RHSA-2024:7551
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7551
20
reference_url https://access.redhat.com/errata/RHSA-2024:7553
reference_id RHSA-2024:7553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7553
21
reference_url https://access.redhat.com/errata/RHSA-2024:7623
reference_id RHSA-2024:7623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7623
22
reference_url https://usn.ubuntu.com/7042-1/
reference_id USN-7042-1
reference_type
scores
url https://usn.ubuntu.com/7042-1/
23
reference_url https://usn.ubuntu.com/7042-2/
reference_id USN-7042-2
reference_type
scores
url https://usn.ubuntu.com/7042-2/
24
reference_url https://usn.ubuntu.com/7042-3/
reference_id USN-7042-3
reference_type
scores
url https://usn.ubuntu.com/7042-3/
25
reference_url https://usn.ubuntu.com/7043-1/
reference_id USN-7043-1
reference_type
scores
url https://usn.ubuntu.com/7043-1/
26
reference_url https://usn.ubuntu.com/7043-2/
reference_id USN-7043-2
reference_type
scores
url https://usn.ubuntu.com/7043-2/
27
reference_url https://usn.ubuntu.com/7043-3/
reference_id USN-7043-3
reference_type
scores
url https://usn.ubuntu.com/7043-3/
28
reference_url https://usn.ubuntu.com/7043-4/
reference_id USN-7043-4
reference_type
scores
url https://usn.ubuntu.com/7043-4/
29
reference_url https://www.cups.org
reference_id www.cups.org
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-27T18:10:15Z/
url https://www.cups.org
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u3%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-5?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-5%3Fdistro=trixie
5
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
6
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2024-47176
risk_score 10.0
exploitability 2.0
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jvcy-2qyh-jqg4
15
url VCID-mcmb-bvw9-dba5
vulnerability_id VCID-mcmb-bvw9-dba5
summary
Multiple vulnerabilities have been found in cups-filters, worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6475.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6475
reference_id
reference_type
scores
0
value 0.20679
scoring_system epss
scoring_elements 0.95557
published_at 2026-04-01T12:55:00Z
1
value 0.20679
scoring_system epss
scoring_elements 0.95566
published_at 2026-04-02T12:55:00Z
2
value 0.20679
scoring_system epss
scoring_elements 0.95571
published_at 2026-04-04T12:55:00Z
3
value 0.20679
scoring_system epss
scoring_elements 0.95573
published_at 2026-04-07T12:55:00Z
4
value 0.20679
scoring_system epss
scoring_elements 0.9558
published_at 2026-04-08T12:55:00Z
5
value 0.20679
scoring_system epss
scoring_elements 0.95583
published_at 2026-04-09T12:55:00Z
6
value 0.20679
scoring_system epss
scoring_elements 0.95588
published_at 2026-04-11T12:55:00Z
7
value 0.20679
scoring_system epss
scoring_elements 0.95589
published_at 2026-04-12T12:55:00Z
8
value 0.20679
scoring_system epss
scoring_elements 0.9559
published_at 2026-04-13T12:55:00Z
9
value 0.20679
scoring_system epss
scoring_elements 0.95599
published_at 2026-04-16T12:55:00Z
10
value 0.20679
scoring_system epss
scoring_elements 0.95604
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6475
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1027550
reference_id 1027550
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1027550
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
reference_id 741318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
reference_id 741333
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
8
reference_url https://security.gentoo.org/glsa/201406-16
reference_id GLSA-201406-16
reference_type
scores
url https://security.gentoo.org/glsa/201406-16
9
reference_url https://usn.ubuntu.com/2143-1/
reference_id USN-2143-1
reference_type
scores
url https://usn.ubuntu.com/2143-1/
10
reference_url https://usn.ubuntu.com/2144-1/
reference_id USN-2144-1
reference_type
scores
url https://usn.ubuntu.com/2144-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.47-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2013-6475
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mcmb-bvw9-dba5
16
url VCID-rcep-az2v-1yab
vulnerability_id VCID-rcep-az2v-1yab
summary cups-filters: cups-filters: Heap buffer overflow in rastertopclx filter may lead arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-64524
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06351
published_at 2026-04-18T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09791
published_at 2026-04-02T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09865
published_at 2026-04-09T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09873
published_at 2026-04-11T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.09837
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.09821
published_at 2026-04-13T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09703
published_at 2026-04-16T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09841
published_at 2026-04-04T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09742
published_at 2026-04-07T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09813
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-64524
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64524
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2414780
reference_id 2414780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2414780
5
reference_url https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06
reference_id 956283c74a34ae924266a2a63f8e5f529a1abd06
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/
url https://github.com/OpenPrinting/cups-filters/commit/956283c74a34ae924266a2a63f8e5f529a1abd06
6
reference_url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv
reference_id GHSA-rq44-2q5p-x3hv
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-21T16:06:45Z/
url https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq44-2q5p-x3hv
7
reference_url https://usn.ubuntu.com/7878-1/
reference_id USN-7878-1
reference_type
scores
url https://usn.ubuntu.com/7878-1/
8
reference_url https://usn.ubuntu.com/7878-2/
reference_id USN-7878-2
reference_type
scores
url https://usn.ubuntu.com/7878-2/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2025-64524
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcep-az2v-1yab
17
url VCID-uz2u-k3vm-w3c2
vulnerability_id VCID-uz2u-k3vm-w3c2
summary security update
references
0
reference_url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS
reference_id
reference_type
scores
url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWS
1
reference_url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7419
reference_id
reference_type
scores
url http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7419
2
reference_url http://rhn.redhat.com/errata/RHSA-2016-0491.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0491.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8560.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8560.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8560
reference_id
reference_type
scores
0
value 0.10778
scoring_system epss
scoring_elements 0.93367
published_at 2026-04-18T12:55:00Z
1
value 0.10778
scoring_system epss
scoring_elements 0.93362
published_at 2026-04-16T12:55:00Z
2
value 0.10778
scoring_system epss
scoring_elements 0.93314
published_at 2026-04-01T12:55:00Z
3
value 0.10778
scoring_system epss
scoring_elements 0.93322
published_at 2026-04-02T12:55:00Z
4
value 0.10778
scoring_system epss
scoring_elements 0.93328
published_at 2026-04-07T12:55:00Z
5
value 0.10778
scoring_system epss
scoring_elements 0.93336
published_at 2026-04-08T12:55:00Z
6
value 0.10778
scoring_system epss
scoring_elements 0.93341
published_at 2026-04-09T12:55:00Z
7
value 0.10778
scoring_system epss
scoring_elements 0.93345
published_at 2026-04-11T12:55:00Z
8
value 0.10778
scoring_system epss
scoring_elements 0.93344
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8560
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560
7
reference_url http://www.debian.org/security/2015/dsa-3419
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3419
8
reference_url http://www.debian.org/security/2015/dsa-3429
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3429
9
reference_url http://www.openwall.com/lists/oss-security/2015/12/13/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/13/2
10
reference_url http://www.openwall.com/lists/oss-security/2015/12/14/13
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/12/14/13
11
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
12
reference_url http://www.ubuntu.com/usn/USN-2838-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2838-1
13
reference_url http://www.ubuntu.com/usn/USN-2838-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2838-2
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1291227
reference_id 1291227
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1291227
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807930
reference_id 807930
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807930
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807993
reference_id 807993
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=807993
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.2.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:cups-filters:1.3.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8560
reference_id CVE-2015-8560
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2015-8560
79
reference_url https://access.redhat.com/errata/RHSA-2016:0491
reference_id RHSA-2016:0491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0491
80
reference_url https://usn.ubuntu.com/2838-1/
reference_id USN-2838-1
reference_type
scores
url https://usn.ubuntu.com/2838-1/
81
reference_url https://usn.ubuntu.com/2838-2/
reference_id USN-2838-2
reference_type
scores
url https://usn.ubuntu.com/2838-2/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.4.0-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2015-8560
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uz2u-k3vm-w3c2
18
url VCID-vunm-ehd2-yugs
vulnerability_id VCID-vunm-ehd2-yugs
summary
Multiple vulnerabilities have been found in cups-filters, worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6473
reference_id
reference_type
scores
0
value 0.13715
scoring_system epss
scoring_elements 0.94225
published_at 2026-04-01T12:55:00Z
1
value 0.13715
scoring_system epss
scoring_elements 0.94234
published_at 2026-04-02T12:55:00Z
2
value 0.13715
scoring_system epss
scoring_elements 0.94246
published_at 2026-04-04T12:55:00Z
3
value 0.13715
scoring_system epss
scoring_elements 0.94247
published_at 2026-04-07T12:55:00Z
4
value 0.13715
scoring_system epss
scoring_elements 0.94256
published_at 2026-04-08T12:55:00Z
5
value 0.13715
scoring_system epss
scoring_elements 0.94261
published_at 2026-04-09T12:55:00Z
6
value 0.13715
scoring_system epss
scoring_elements 0.94265
published_at 2026-04-12T12:55:00Z
7
value 0.13715
scoring_system epss
scoring_elements 0.94266
published_at 2026-04-13T12:55:00Z
8
value 0.13715
scoring_system epss
scoring_elements 0.9428
published_at 2026-04-16T12:55:00Z
9
value 0.13715
scoring_system epss
scoring_elements 0.94286
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6473
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
reference_id 741318
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741318
3
reference_url https://security.gentoo.org/glsa/201406-16
reference_id GLSA-201406-16
reference_type
scores
url https://security.gentoo.org/glsa/201406-16
4
reference_url https://usn.ubuntu.com/2143-1/
reference_id USN-2143-1
reference_type
scores
url https://usn.ubuntu.com/2143-1/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie
purl pkg:deb/debian/cups-filters@1.0.47-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.0.47-1%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2013-6473
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vunm-ehd2-yugs
19
url VCID-vzgv-8drt-8yd5
vulnerability_id VCID-vzgv-8drt-8yd5
summary A vulnerability has been found in CUPS filters where remote code execution is possible via the beh filter.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24805.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-24805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-24805
reference_id
reference_type
scores
0
value 0.08929
scoring_system epss
scoring_elements 0.92555
published_at 2026-04-02T12:55:00Z
1
value 0.08929
scoring_system epss
scoring_elements 0.92562
published_at 2026-04-04T12:55:00Z
2
value 0.08929
scoring_system epss
scoring_elements 0.92564
published_at 2026-04-07T12:55:00Z
3
value 0.08929
scoring_system epss
scoring_elements 0.92575
published_at 2026-04-08T12:55:00Z
4
value 0.08929
scoring_system epss
scoring_elements 0.9258
published_at 2026-04-09T12:55:00Z
5
value 0.08929
scoring_system epss
scoring_elements 0.92586
published_at 2026-04-13T12:55:00Z
6
value 0.08929
scoring_system epss
scoring_elements 0.92587
published_at 2026-04-12T12:55:00Z
7
value 0.08929
scoring_system epss
scoring_elements 0.92599
published_at 2026-04-16T12:55:00Z
8
value 0.08929
scoring_system epss
scoring_elements 0.92598
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-24805
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24805
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036224
reference_id 1036224
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036224
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2203051
reference_id 2203051
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2203051
6
reference_url https://security.gentoo.org/glsa/202401-06
reference_id GLSA-202401-06
reference_type
scores
url https://security.gentoo.org/glsa/202401-06
7
reference_url https://access.redhat.com/errata/RHSA-2023:3423
reference_id RHSA-2023:3423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3423
8
reference_url https://access.redhat.com/errata/RHSA-2023:3424
reference_id RHSA-2023:3424
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3424
9
reference_url https://access.redhat.com/errata/RHSA-2023:3425
reference_id RHSA-2023:3425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3425
10
reference_url https://access.redhat.com/errata/RHSA-2023:3426
reference_id RHSA-2023:3426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3426
11
reference_url https://access.redhat.com/errata/RHSA-2023:3427
reference_id RHSA-2023:3427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3427
12
reference_url https://access.redhat.com/errata/RHSA-2023:3428
reference_id RHSA-2023:3428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3428
13
reference_url https://access.redhat.com/errata/RHSA-2023:3429
reference_id RHSA-2023:3429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3429
14
reference_url https://usn.ubuntu.com/6083-1/
reference_id USN-6083-1
reference_type
scores
url https://usn.ubuntu.com/6083-1/
15
reference_url https://usn.ubuntu.com/6083-2/
reference_id USN-6083-2
reference_type
scores
url https://usn.ubuntu.com/6083-2/
fixed_packages
0
url pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.7-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/cups-filters@1.28.17-3?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%3Fdistro=trixie
2
url pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-3%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-3%252Bdeb12u2%3Fdistro=trixie
3
url pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-6%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-6%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
purl pkg:deb/debian/cups-filters@1.28.17-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.17-7%3Fdistro=trixie
aliases CVE-2023-24805
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzgv-8drt-8yd5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/cups-filters@1.28.7-1%252Bdeb11u2%3Fdistro=trixie